"Innovation and technology can continue to change the world."

ARTIFICIAL INTELLIGENCE

“Everything we love about civilization is a product of intelligence, so amplifying our human intelligence with artificial intelligence has the potential of helping civilization flourish like never before – as long as we manage to keep the technology beneficial.“

"Determined cyber adversaries have proven over the past couple of years that they can defeat the protections of even the world’s most sophisticated security organizations. They’re compiling custom malware to evade signature-based detection tools such as antivirus scanners. They’re using social engineering techniques on unsuspecting employees to circumvent organizations’ perimeter defenses."

"They’re covering their tracks within systems and leveraging techniques they have perfected across multiple targets. Today, security experts concede it’s unrealistic to keep attackers entirely out of most networks and systems. Cyber adversaries have the skills, resources and motives to assail their high-value targets repeatedly, trying various techniques, until they succeed. In this persistent threat environment, preventing attacks becomes impractical. Instead, detecting attacks and mitigating their damage becomes the primary focus (RSA Security Brief, 2012)."

SaaS - Security as a Service

The Art of War, Sun Tzu

The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable.

· *Ensure the availability of data and processing resources.

· *Provide assurance for the confidentiality and integrity of customer data and allow for the compartmentalization of risk for customers and your organization.

· * Ensure the integrity of data processing operations and protect them from unauthorized use.

· * Ensure the confidentiality of the customer’s and your processed data, and prevent unauthorized disclosure or use.

· * Ensure the integrity of the customer’s and your processed data, and prevent the unauthorized and undetected modification, substitution, insertion, and deletion of that data.

Cloud Computing

“Enterprises are embracing a new model of infrastructure to deliver IT as a Service through hybrid cloud computing,” said Raghu Raghuram, senior vice president and general manager, virtualization and cloud platforms, VMware. “The products and services we are launching today provide a comprehensive enterprise architecture that will deliver the agility and economics of the cloud with the security and quality of service our enterprise customers need.” (VM Ware, 2010)